SlideShare uma empresa Scribd logo
1 de 18
Hack For Security
Web Design, Web Application Security and Digital Inspiration.
When it all was started ?
• In the 2nd semester of the Engineering.

• I have learned about the XSS, SQLI and File
Upload and symlink and rooting.

• That was enough to get the root access in the
server.
I started exploiting vulnerability!

• After learning the stuffs I have started exploiting
the vulnerability of the Pakistani websites as
they where hacking Indian websites!
Why I stopped exploiting vulnerability ?
• One day when I was enjoying my coffee, I
thought exploiting the vulnerability of the
website is bad thing instead I can help the
Indian webmasters to secure their application by
reporting the vulnerability to them! And again I
stopped doing that because most of them didn’t
cared about the website security
They said you have to face our legal
Department !
• As I was reporting the bug to the
webmasters, one of them said that don’t test
your skills on our websites else you have to face
our legal department !!
My Reaction:
• I just said “Okay!”
• What I was willing to say ? If you didn’t patched SQL loophole
then you probably gonna face our legal department !
I have started Blogging !

•Why ???
• I wanted to improve my English language.
• And Warren Buffett once said Never be
depended on Single income source 
Why I have started participating in Bug
Bounty Programs ?
• They Respect the Security Researchers
(Hackers).
• They Give acknowledgements !
• They give cool stuffs that money can’t buy 
I got acknowledged By Apple Inc.
• I have found mixed-content issue in apple.com
and they gave me acknowledgement.
Got acknowledged by Google
• #Finally Dream came true ♥ m/ :)
• I have found XXS vulnerability in Google Art Project
and they have offered me acknowledgement in
Google Honorable mention and $100 as a reward.
PayPal Offered me $500 as a reward 
• I have found Server Miss Configuration in
Paypal.com.au
Again Dream came true 
• #Again accomplished my Dream ♥ m/ :D
• I have found Email Spoofing in Blogger.com
and again they offered acknowledgement in
Google Reward Recipients and $100 as a
reward 
How much I Made ?
• I am a web Entrepreneur and I don’t work for
money 
• I work for respect and my dreams 

• By the way I have made $3095.83
in last 6 months of 2013  !
What if you want me to test your
website for vulnerability ?
• Just contact me @
TheSiddharthSolanki@gmail.com and we
will discuss about it 
About Me:
• Name: Siddharth Solanki
• Security Researcher/Hacker (As they call me! )

• Blogger (By choice :D)
• Engineer (By choice :D)
• Graphics Designer (By choice)
Thanks :
• Thanks to Vasim Belim, Dushyant Vaghela
and Utsav oza, for Being Awesome Friends!

• Thanks to Almighty GOD for making me
Fully, Totally and completely Independent  !
• Thanks to Echai and My college (VVP) for
giving me opportunity to promote my skills!
Questions ?
Let’s be Friends 
@HackForSecurity

/Siddharth.solanki.hfs

/HackForSecurity

/siddharthsolankihfs

/+SiddhartHSolankI

HackForSecurity.com

Mais conteúdo relacionado

Mais procurados

Website evaluation
Website evaluationWebsite evaluation
Website evaluation
Ann Vega
 

Mais procurados (7)

How to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and RipoffsHow to Avoid Online Marketing Scams and Ripoffs
How to Avoid Online Marketing Scams and Ripoffs
 
All About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp BerlinAll About Author Tags - Meet up #1 - BlogUp Berlin
All About Author Tags - Meet up #1 - BlogUp Berlin
 
Backlinks
 Backlinks Backlinks
Backlinks
 
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing PlanMarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
MarketMix 2013 - Storytelling as Part of Your Content Marketing Plan
 
How to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social LoveHow to Establish Social Proof Using Social Love
How to Establish Social Proof Using Social Love
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Article Marketing and Content Cheapskates
Article Marketing and Content CheapskatesArticle Marketing and Content Cheapskates
Article Marketing and Content Cheapskates
 

Destaque

Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
deepu427
 

Destaque (9)

Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Information Security and Ethical Hacking
Information Security and Ethical HackingInformation Security and Ethical Hacking
Information Security and Ethical Hacking
 
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program... [DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
[DevDay 2016] Anti hacking on game development - Speaker: Khanh Le – Program...
 
Tsunami warning system
Tsunami warning systemTsunami warning system
Tsunami warning system
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
SUPER CAPACITOR
SUPER CAPACITORSUPER CAPACITOR
SUPER CAPACITOR
 
Dc motor
Dc motor Dc motor
Dc motor
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
The Big Bang Theory
The Big Bang TheoryThe Big Bang Theory
The Big Bang Theory
 

Semelhante a Hack for security

State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013
Blurbpoint
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for Realtors
Richard Smith
 

Semelhante a Hack for security (20)

Known SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEOKnown SEO. No SEO - A more powerful approach to SEO
Known SEO. No SEO - A more powerful approach to SEO
 
Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.Infosec Sucks - and its not because of he people.
Infosec Sucks - and its not because of he people.
 
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank WebsitesGoogle is Watching You: How Google Spies on Search Behavior to Rank Websites
Google is Watching You: How Google Spies on Search Behavior to Rank Websites
 
How to Start a Company
How to Start a CompanyHow to Start a Company
How to Start a Company
 
Social Media for Eyecare Professionals
Social Media for Eyecare ProfessionalsSocial Media for Eyecare Professionals
Social Media for Eyecare Professionals
 
New Age Marketing
New Age MarketingNew Age Marketing
New Age Marketing
 
Sucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sitesSucuri Webinar: How to clean hacked WordPress sites
Sucuri Webinar: How to clean hacked WordPress sites
 
Evil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application SecurityEvil User Stories - Improve Your Application Security
Evil User Stories - Improve Your Application Security
 
The Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger DooleyThe Brainy Way to Build Your Community - Roger Dooley
The Brainy Way to Build Your Community - Roger Dooley
 
Account entrapment
Account entrapmentAccount entrapment
Account entrapment
 
Account Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s AccountAccount Entrapment - Forcing a Victim into an Attacker’s Account
Account Entrapment - Forcing a Victim into an Attacker’s Account
 
State of Internet Marketing 2013
State of Internet Marketing 2013State of Internet Marketing 2013
State of Internet Marketing 2013
 
Maximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for RealtorsMaximizing Your Virtual Assistant for Realtors
Maximizing Your Virtual Assistant for Realtors
 
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
Nir goldshlager Killing a bug bounty program - twice Hack In The Box 2012
 
Seven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress ProSeven Core Competency Framework of a WordPress Pro
Seven Core Competency Framework of a WordPress Pro
 
How to Bootstrap a Startup?
How to Bootstrap a Startup?How to Bootstrap a Startup?
How to Bootstrap a Startup?
 
Everyday Seo by Tom Veltri
Everyday Seo by Tom VeltriEveryday Seo by Tom Veltri
Everyday Seo by Tom Veltri
 
Web + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for LawyersWeb + Social Media + Cyber Security for Lawyers
Web + Social Media + Cyber Security for Lawyers
 
How to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deckHow to Overcome Sales Call Reluctance- Webinar slide deck
How to Overcome Sales Call Reluctance- Webinar slide deck
 
SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation SEMA: shifting gears back_to_business - Corey Perlman Presentation
SEMA: shifting gears back_to_business - Corey Perlman Presentation
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Hack for security

  • 1. Hack For Security Web Design, Web Application Security and Digital Inspiration.
  • 2. When it all was started ? • In the 2nd semester of the Engineering. • I have learned about the XSS, SQLI and File Upload and symlink and rooting. • That was enough to get the root access in the server.
  • 3. I started exploiting vulnerability! • After learning the stuffs I have started exploiting the vulnerability of the Pakistani websites as they where hacking Indian websites!
  • 4. Why I stopped exploiting vulnerability ? • One day when I was enjoying my coffee, I thought exploiting the vulnerability of the website is bad thing instead I can help the Indian webmasters to secure their application by reporting the vulnerability to them! And again I stopped doing that because most of them didn’t cared about the website security
  • 5. They said you have to face our legal Department ! • As I was reporting the bug to the webmasters, one of them said that don’t test your skills on our websites else you have to face our legal department !!
  • 6. My Reaction: • I just said “Okay!” • What I was willing to say ? If you didn’t patched SQL loophole then you probably gonna face our legal department !
  • 7. I have started Blogging ! •Why ??? • I wanted to improve my English language. • And Warren Buffett once said Never be depended on Single income source 
  • 8. Why I have started participating in Bug Bounty Programs ? • They Respect the Security Researchers (Hackers). • They Give acknowledgements ! • They give cool stuffs that money can’t buy 
  • 9. I got acknowledged By Apple Inc. • I have found mixed-content issue in apple.com and they gave me acknowledgement.
  • 10. Got acknowledged by Google • #Finally Dream came true ♥ m/ :) • I have found XXS vulnerability in Google Art Project and they have offered me acknowledgement in Google Honorable mention and $100 as a reward.
  • 11. PayPal Offered me $500 as a reward  • I have found Server Miss Configuration in Paypal.com.au
  • 12. Again Dream came true  • #Again accomplished my Dream ♥ m/ :D • I have found Email Spoofing in Blogger.com and again they offered acknowledgement in Google Reward Recipients and $100 as a reward 
  • 13. How much I Made ? • I am a web Entrepreneur and I don’t work for money  • I work for respect and my dreams  • By the way I have made $3095.83 in last 6 months of 2013  !
  • 14. What if you want me to test your website for vulnerability ? • Just contact me @ TheSiddharthSolanki@gmail.com and we will discuss about it 
  • 15. About Me: • Name: Siddharth Solanki • Security Researcher/Hacker (As they call me! ) • Blogger (By choice :D) • Engineer (By choice :D) • Graphics Designer (By choice)
  • 16. Thanks : • Thanks to Vasim Belim, Dushyant Vaghela and Utsav oza, for Being Awesome Friends! • Thanks to Almighty GOD for making me Fully, Totally and completely Independent  ! • Thanks to Echai and My college (VVP) for giving me opportunity to promote my skills!
  • 18. Let’s be Friends  @HackForSecurity /Siddharth.solanki.hfs /HackForSecurity /siddharthsolankihfs /+SiddhartHSolankI HackForSecurity.com